Sciweavers

2342 search results - page 319 / 469
» A Methodology for Evaluating Software Engineering Methods an...
Sort
View
AVI
2006
13 years 10 months ago
Distributed intelligence: extending the power of the unaided, individual human mind
The history of the human race is one of increasing intellectual capability. Since the time of our early ancestors, our brains have gotten no bigger; nevertheless, there has been a...
Gerhard Fischer
IIE
2007
154views more  IIE 2007»
13 years 9 months ago
Computer Aided Modelling Exercises
This paper describes a didactical Computer Aided Software Engineering (CASE)-tool that was developed for use within the context of a course in object-oriented domain modelling. In...
Monique Snoeck, Raf Haesen, Herman Buelens, Manu D...
ICST
2011
IEEE
13 years 1 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
ICSE
2011
IEEE-ACM
13 years 23 days ago
Inference of field initialization
A raw object is partially initialized, with only some fields set to legal values. It may violate its object invariants, such as that a given field is non-null. Programs often ma...
Fausto Spoto, Michael D. Ernst
CN
2006
116views more  CN 2006»
13 years 9 months ago
Techniques for available bandwidth measurement in IP networks: A performance comparison
As the Internet grows in scale and complexity, the need for accurate traffic measurement increases. Among the different parameters relevant to traffic measurement, the paper pays ...
Leopoldo Angrisani, Salvatore D'Antonio, Marcello ...